HL7 Spezifikationen für fortgeschrittene Lösungen für Security, Privacy & Safety
|
|
- Ursula Böhm
- vor 8 Jahren
- Abrufe
Transkript
1 Mit Sicherheit HL7 Security, Safety und Privacy in e-health HL7 Spezifikationen für fortgeschrittene Lösungen für Security, Privacy & Safety Prof. Dr. habil., FACMI, FACHI, FHL7 Head,, Deggendorf Institute of Technology, Germany Formerly ehealth Competence Center at University of Regensburg Medical Center Past-Chair HL7 Germany
2 Security, Privacy, and Trust - Definitions Security covers concepts, services, mechanisms and data to guarantee integrity, availability, authenticity, accountability and confidentiality of information. Privacy is a human right for self-determination, respecting wishes and demands regarding collection, processing, communication and use of personal information, thereby preventing harm from disclosure. Trust defines the individual expectations in the context of the collection, processing, communication and use of personal information. It allows acceptance of risk and balancing privacy needs against benefits. Trust can be based on knowledge and experiences of an entity about actors and processes involved in (personal) data management regulations transparently established for ruling related actors behavior and processes legislation binding actors and enforcing processes (law enforcement) services technically enforcing the processes and policies.
3 data algorithms mechanisms services concepts HL7 Spezifikationen für fortgeschrittene Lösungen für Security, Privacy & Safety safety security quality communication security application security identification authentication integrity confidentiality authorisation access control confidentiality audit accountability non-repudiation notary s functions availability accountability non-repudiation notary s functions availability access control integrity accuracy digital signature hashing encryption multiple comp. digital signature hashing key recovery key escrowing fire pro-... tection encryption multiple comp. fire pro-... tection DES IDEA RSA DSA DES IDEA... SHA-1 MD5 EL- GAMAL SHA-1 MD5 RSA... DSA EL- GAMAL data keys certificates data keys certificates
4 The Legal Framework: Challenges and Solutions (after O. Tene & J. Polonetsky) The existing privacy framework focuses on the definition of PII, the principles of data minimization and purpose limitation, and the concept of consent. Investigations also argue that, inevitably, these elements of the privacy framework should adjust to reflect existing technological and organizational realities, which include ubiquitous data collection and individuals who are ill-placed to meaningfully review privacy policies. They argue that the Fair Information Practice Principles (FIPPs: Transparency, Individual Control, Respect for Context, Security, Access, Accuracy, Focused Collection, and Accountability) should be used as a set of levers, which can be modulated to address big data by relaxing the principles of data minimization and individual control while tightening requirements for transparency, access, and accuracy.
5 Objectives This presentation introduces into new standards for privilege management and access control communication and cooperation in healthcare. It refers to NIST RBAC, HL7 RBAC Healthcare Permission Catalog, HL7 Healthcare Privacy and Security Classification System (HCS) Release 1 as well as policy-driven RBAC using explicit ontology-based policies according ISO
6 Entity Entity Permission Object Entity Role Role Permission Object
7 Role-Based Access Control (NIST) SR_Policy Role_Hierarchy 1 Structural_Role Target_Policy 1..* FR_Policy 1 Principal 0..* User_Assignment 0..* 0..* 1 1..* Functional_Role 1 Permission_Assignment 0..* 0..* 1..* Target_Component User_Session 1..* 1..* Session Session_Role 1..* 1 Process_Policy
8 HL7 RBAC Healthcare Permission Catalog Healthcare Scenario Roadmap Maps Work Tasks
9 Security Policy (ISO 22600) Security policy is a complex of legal, organizational, functional, social, ethical and technical aspects to be considered in the context of privacy and security. Security policy defines a framework, privileges and obligations, but also consequences and penalties when the regulations are ignored.
10 System s Architecture A system s architecture describes the systems elements (components), their functions and interrelations. The representation of aspect (domains) of a real world system has to be based on the domains ontologies. Rules for selecting components and functions as well as constraints of the relations according to a business case are called policies. Policies define the intended behavior of a systems. Therefore, flexible, scalable, business-controlled, adaptive, knowledge-based, intelligent systems must follow a systemsoriented, architecture-centric, ontology-based and policydriven approach.
11 Business View Information View Computational View Engineering View Technology View Business View Information View Computational View Engineering View Technology View HL7 Spezifikationen für fortgeschrittene Lösungen für Security, Privacy & Safety Domain Perspective System s Architectural Perspective Resource Domain Policy Domain Medical Domain Admin./Org.Policy Domain Contextual Policy Domain Clinical Policy Domain Business Concepts Relations Networks Aggregations Details Development Process Perspective Formerly ehcc at the University of Regensburg Medical a Center b
12 Policy Ontology (ISO 22600)
13 Policy-Driven Role-Based Access Control SR_Policy Role_Hierarchy 1 Structural_Role Target_Policy 1..* FR_Policy 1 Principal 0..* User_Assignment 0..* 0..* 1 1..* Functional_Role 1 Permission_Assignment 0..* 0..* 1..* Target_Component User_Session 1..* 1..* Session Session_Role 1..* 1 Process_Policy
14 Security Labels Security labels are meta-data of personal health information (PHI). They classify constraints on the WHO, HOW, WHEN, WHERE, WHAT FOR and WHY or in other words, on the actor (which is not necessary a person) and the context for accessing and using PHI. Security Labels are tags linking an information object with a set of security and privacy attributes. They can be bound to data, but also to persons and resources. In the new HL7 Healthcare Privacy and Security Classification System (HCS), the following security labels have been defined: Confidentiality, Sensitivity, Integrity, Compartment and Handling Caveats.
15 HL7 Healthcare Privacy and Security Classification & NIST FIPS 188 Security Label HL7 Spezifikationen für fortgeschrittene Lösungen für Security, Privacy & Safety
16 HCS Security Label Field Usage Notes Field 3: Integrity
17 HCS Security Label Field Usage Notes Field 3: Integrity
18 HCS Security Label Field Usage Notes Field 3: Integrity
19 HCS Security Label Field Usage Notes Field 3: Integrity
20 HCS Security Label Field Usage Notes Field 3: Integrity
21 Security Label
22 Security Labels The Security Category Named Tag set characterizes security and privacy rules for certain clinical information, i.e., they are characteristics of the information objects. Handling Caveats Labels enable the identification of communication and distribution controls, purpose of use, refrain policies and obligations to which custodians and recipients of data passed between systems must comply. They are characteristics of the deployment process. The Handling Caveat Security Label field may also convey privacy marks that are to be rendered when the labeled information is accessed.
23 OpenXML Encoded Example of a SPIF for a Confidentiality Label
24 Security Labeling for Privilege Management and Access Control By defining meta-data such as Access Levels entities must comply for accessing protected IT resources; Clearances granted to an actor for accessing data and information at or below a certain security and privacy level (they are applied to information initiators); Security Labels within a health classification system, applied to resources and data exchanged between health information systems; Security Policy Information Files defining which security labels are valid and how they can checked against the Clearances; privilege and access control management in health information systems can be automated. Hereby, Security Label attributes are used in Access Decision Services as Access Control Decision Information Attribute to check clearances allowing the performance of actions on IT resources against access control policies and to enforce those policies without requiring access to the protected information.
25 Access Control Logical Architecture Monitoring Service HL7 Spezifikationen für fortgeschrittene Lösungen für Security, Privacy & Safety Trust Calculation Service Trust Service Trust History DB
26 Data Segmenting EHR Conceptual Components
27
28 Thank you very much for your kind attention! Prof. Dr. rer. nat. habil., FACMI, FACHI, FHL7 Head, Institut of Technology Deggendorf
Stand der Recherche nach publizierten Identity Management Standards - ISO/IEC, DIN, BSI, CEN/ISSS und OASIS
IT Advisory Group AG Stand der Recherche nach publizierten Identity Management Standards - ISO/IEC, DIN, BSI, CEN/ISSS und OASIS Arslan Brömme Dipl.-Inform., B.Sc. 1 AK GenericIAM Stuttgart, 20. Juni 2006
MehrThe Future Internet in Germany and Europe
The Future Internet in Germany and Europe David Kennedy Direktor Eurescom GmbH Heidelberg, Deutschland Starting point.. The innovative society and sustainable economy of Europe 2020 will be based on ICT
MehrCloud Architektur Workshop
Cloud Architektur Workshop Ein Angebot von IBM Software Services for Cloud & Smarter Infrastructure Agenda 1. Überblick Cloud Architektur Workshop 2. In 12 Schritten bis zur Cloud 3. Workshop Vorgehensmodell
MehrBig Data Analytics. Fifth Munich Data Protection Day, March 23, Dr. Stefan Krätschmer, Data Privacy Officer, Europe, IBM
Big Data Analytics Fifth Munich Data Protection Day, March 23, 2017 C Dr. Stefan Krätschmer, Data Privacy Officer, Europe, IBM Big Data Use Cases Customer focused - Targeted advertising / banners - Analysis
MehrCombined financial statements as of December 31, 2017
Combined financial statements as of December 31, 2017 AUDITOR'S REPORT Aid to the Church in Need (Foundation under Canon Law) Königstein im Taunus KPMG AG Wirtschaftsprüfungsgesellschaft This
MehrContext-adaptation based on Ontologies and Spreading Activation
-1- Context-adaptation based on Ontologies and Spreading Activation ABIS 2007, Halle, 24.09.07 {hussein,westheide,ziegler}@interactivesystems.info -2- Context Adaptation in Spreadr Pubs near my location
MehrUnterstützt HL7 die interdisziplinäre Zusammenarbeit?
Effiziente und wirtschaftliche Gesundheitsversorgung von heute und morgen nur mit Medizinischer Dokumentation und Medizinischer Informatik, Medizinischer Biometrie und Epidemiologie 5. bis 9. September
MehrRepositioning University Collections as Scientific Infrastructures.
Repositioning University Collections as Scientific Infrastructures. HUMANE Seminar Academic Cultural Heritage: The Crown Jewels of Academia Rome, November 14-16, 2014 Dr. Cornelia Weber Humboldt University
MehrISO 15504 Reference Model
Process flow Remarks Role Documents, data, tools input, output Start Define purpose and scope Define process overview Define process details Define roles no Define metrics Pre-review Review yes Release
MehrCreating OpenSocial Gadgets. Bastian Hofmann
Creating OpenSocial Gadgets Bastian Hofmann Agenda Part 1: Theory What is a Gadget? What is OpenSocial? Privacy at VZ-Netzwerke OpenSocial Services OpenSocial without Gadgets - The Rest API Part 2: Practical
MehrInformation Governance - Enabling Information
Information Governance - Enabling Information Dr. Wolfgang Johannsen Frankfurt, den 3. April 2014 Akademische Programme Berufsbegleitende Programme Seminare Executive Education Firmenprogramme & Services
MehrUnternehmensweite IT Architekturen
Unternehmensweite IT Architekturen Part 1: IT Systems Architecture, Roles and Responsibilities of IT Architects Part 2: Solution Architecture, based on a practical Case Study Part 3: SOA (Service Oriented
MehrCorporate Digital Learning, How to Get It Right. Learning Café
0 Corporate Digital Learning, How to Get It Right Learning Café Online Educa Berlin, 3 December 2015 Key Questions 1 1. 1. What is the unique proposition of digital learning? 2. 2. What is the right digital
MehrVGM. VGM information. HAMBURG SÜD VGM WEB PORTAL USER GUIDE June 2016
Overview The Hamburg Süd VGM Web portal is an application that enables you to submit VGM information directly to Hamburg Süd via our e-portal Web page. You can choose to enter VGM information directly,
MehrCustomer-specific software for autonomous driving and driver assistance (ADAS)
This press release is approved for publication. Press Release Chemnitz, February 6 th, 2014 Customer-specific software for autonomous driving and driver assistance (ADAS) With the new product line Baselabs
MehrAddressing the Location in Spontaneous Networks
Addressing the Location in Spontaneous Networks Enabling BOTH: Privacy and E-Commerce Design by Moritz Strasser 1 Disappearing computers Trends Mobility and Spontaneous Networks (MANET = Mobile Ad hoc
Mehrprorm Budget Planning promx GmbH Nordring Nuremberg
prorm Budget Planning Budget Planning Business promx GmbH Nordring 100 909 Nuremberg E-Mail: support@promx.net Content WHAT IS THE prorm BUDGET PLANNING? prorm Budget Planning Overview THE ADVANTAGES OF
MehrSocial Innovation and Transition
Social Innovation and Transition Dmitri Domanski & Jürgen Howaldt TU Dortmund University Sozialforschungsstelle Dortmund Co-innovation theory and practice to facilitate change Wageningen, October 28-29,
MehrGeschäftsprozesse und Regeln
Geschäftsprozesse und Regeln 7 Szenarien einer möglichen Integration Jana Koehler Hochschule Luzern Lucerne University of Applied Sciences and Arts jana.koehler@hslu.ch Gartner: Organizations struggle
MehrTMF projects on IT infrastructure for clinical research
Welcome! TMF projects on IT infrastructure for clinical research R. Speer Telematikplattform für Medizinische Forschungsnetze (TMF) e.v. Berlin Telematikplattform für Medizinische Forschungsnetze (TMF)
MehrTitelbild1 ANSYS. Customer Portal LogIn
Titelbild1 ANSYS Customer Portal LogIn 1 Neuanmeldung Neuanmeldung: Bitte Not yet a member anklicken Adressen-Check Adressdaten eintragen Customer No. ist hier bereits erforderlich HERE - Button Hier nochmal
MehrGeistes-, Natur-, Sozial- und Technikwissenschaften gemeinsam unter einem Dach. Programmes for refugees at Bielefeld University
Programmes for refugees at Bielefeld University 1 Bielefeld University Funded in 1969 Middle-sized university with 28.000 students, 1800 of them international students, 13 faculties: main focus on Natural
MehrElektronische Identifikation und Vertrauensdienste für Europa
Brüssel/Berlin Elektronische Identifikation und Vertrauensdienste für Europa Wir wären dann soweit --- oder? Thomas Walloschke Director EMEIA Security Technology Office eidas REGULATION No 910/2014 0 eidas
MehrKAN session on "Transformations" Transformative indicators and the transformation of work
KAN session on "Transformations" Transformative indicators and the transformation of work 1. Transformations-what do we mean? 2. The root of the idea of the Great Transformation : Polany and beyond 3.
MehrProf. Dr. Margit Scholl, Mr. RD Guldner Mr. Coskun, Mr. Yigitbas. Mr. Niemczik, Mr. Koppatz (SuDiLe GbR)
Prof. Dr. Margit Scholl, Mr. RD Guldner Mr. Coskun, Mr. Yigitbas in cooperation with Mr. Niemczik, Mr. Koppatz (SuDiLe GbR) Our idea: Fachbereich Wirtschaft, Verwaltung und Recht Simple strategies of lifelong
MehrHow does the Institute for quality and efficiency in health care work?
Health Care for all Creating Effective and Dynamic Structures How does the Institute for quality and efficiency in health care work? Peter T. Sawicki; Institute for Quality and Efficiency in Health Care.
MehrHow to develop and improve the functioning of the audit committee The Auditor s View
How to develop and improve the functioning of the audit committee The Auditor s View May 22, 2013 Helmut Kerschbaumer KPMG Austria Audit Committees in Austria Introduced in 2008, applied since 2009 Audit
MehrSecurity Planning Basics
Einführung in die Wirtschaftsinformatik VO WS 2009/2010 Security Planning Basics Gerald.Quirchmayr@univie.ac.at Textbook used as basis for these slides and recommended as reading: Whitman, M. E. & Mattord,
MehrNEWSLETTER. FileDirector Version 2.5 Novelties. Filing system designer. Filing system in WinClient
Filing system designer FileDirector Version 2.5 Novelties FileDirector offers an easy way to design the filing system in WinClient. The filing system provides an Explorer-like structure in WinClient. The
MehrAdvanced Availability Transfer Transfer absences from HR to PPM
Advanced Availability Transfer Transfer absences from HR to PPM A PLM Consulting Solution Public Advanced Availability Transfer With this solution you can include individual absences and attendances from
MehrSport Northern Ireland. Talent Workshop Thursday 28th January 2010 Holiday Inn Express, Antrim
Sport Northern Ireland Talent Workshop Thursday 28th January 2010 Holiday Inn Express, Antrim Outcomes By the end of the day participants will be able to: Define and differentiate between the terms ability,
MehrLong-term archiving of medical data new certified cloud-based solution offers high security and legally approved data management
Long-term archiving of medical data new certified cloud-based solution offers high security and legally approved data management The European Centre of Expertise for the Health Care Industry Langzeitarchivierung
MehrHIR Method & Tools for Fit Gap analysis
HIR Method & Tools for Fit Gap analysis Based on a Powermax APML example 1 Base for all: The Processes HIR-Method for Template Checks, Fit Gap-Analysis, Change-, Quality- & Risk- Management etc. Main processes
MehrThe Development and Use of Industrial Robots the Educational/Work Science Perspective (part 1)
Prof. Dr. Martin Fischer Institut für Berufspädagogik und Allgemeine Pädagogik Internet: http://www.ibp.kit.edu The Development and Use of Industrial Robots the Educational/Work Science Perspective (part
MehrLess is more? Checks and balances in sport organisations
Less is more? Checks and balances in sport organisations Dr. Michael Groll Play the Game Conference Aarhus, October 29th 2013 Checks and Balances in Sport Organisations Insufficient democratic participatio
MehrLabour law and Consumer protection principles usage in non-state pension system
Labour law and Consumer protection principles usage in non-state pension system by Prof. Dr. Heinz-Dietrich Steinmeyer General Remarks In private non state pensions systems usually three actors Employer
MehrVGM. VGM information. HAMBURG SÜD VGM WEB PORTAL - USER GUIDE June 2016
Overview The Hamburg Süd VGM-Portal is an application which enables to submit VGM information directly to Hamburg Süd via our e-portal web page. You can choose to insert VGM information directly, or download
MehrExercise (Part II) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1
Exercise (Part II) Notes: The exercise is based on Microsoft Dynamics CRM Online. For all screenshots: Copyright Microsoft Corporation. The sign ## is you personal number to be used in all exercises. All
MehrGAUSS towards a common certification process for GNSS applications using the European Satellite System Galileo
GAUSS towards a common certification process for GNSS applications using the European Satellite System Galileo Matthias Grimm, Dr. Michael Meyer zu Hörste Vortragstitel > 11. Juni 2010 > Folie 1 Agenda
MehrMagic Figures. We note that in the example magic square the numbers 1 9 are used. All three rows (columns) have equal sum, called the magic number.
Magic Figures Introduction: This lesson builds on ideas from Magic Squares. Students are introduced to a wider collection of Magic Figures and consider constraints on the Magic Number associated with such
MehrProviders of climate services in Germany
Providers of climate services in Germany National Dialog Prof. Dr. Maria Manez Costa Dr. Jörg Cortekar 2 Procedure Mapping of climate services providers - Germany Network development between the providers
MehrSicherheit / Sicherung - unterschiedliche Begriffsbestimmung, gemeinsame Fachaspekte
Sicherheit / Sicherung - unterschiedliche Begriffsbestimmung, gemeinsame Fachaspekte F. Seidel, BfS Salzgitter (Juli 2002) 1) Begriffsbestimmung (Vergleich unter Nutzung nationaler und internationaler
MehrThemen für Seminararbeiten WS 15/16
Themen für Seminararbeiten WS 15/16 Institut für nachhaltige Unternehmensführung Themenblock A: 1) Carsharing worldwide - An international Comparison 2) The influence of Carsharing towards other mobility
MehrTube Analyzer LogViewer 2.3
Tube Analyzer LogViewer 2.3 User Manual Stand: 25.9.2015 Seite 1 von 11 Name Company Date Designed by WKS 28.02.2013 1 st Checker 2 nd Checker Version history Version Author Changes Date 1.0 Created 19.06.2015
MehrGMP Training Course. EU GMP Requirements. Sterile medicinal product
GMP Training Course 20-21 October 2009 EU GMP Requirements Sterile medicinal product Dr. Martin Melzer Dr. Martin Melzer Pharmacist / GMP Inspector Tel.: + 49 (0) 511 9096 450 martin.melzer@gaa-h.niedersachsen.de
MehrUnit 1. Motivation and Basics of Classical Logic. Fuzzy Logic I 6
Unit 1 Motivation and Basics of Classical Logic Fuzzy Logic I 6 Motivation In our everyday life, we use vague, qualitative, imprecise linguistic terms like small, hot, around two o clock Even very complex
MehrBackground. Background. Background. How to evaluate marine safety? 12/10/30. Safety Assessment by Ship Handling Simulator
Safety assessment of navigation is quite important, especially in congested waterways. Kazuhiko Hasegawa*, Kojiro Hata**, Kazuhiro Niwa***, Takeshige Nakano****, Huashi Jin****, Erkang Fu**** Osaka University,
MehrMulticriterial Design Decision Making regarding interdependent Objectives in DfX
Overview Multicriterial Design Decision Making regarding interdependent Objectives in DfX S. Bauer The Design Process Support of the Design Process with Design for X Visualization of Decision Problems
MehrELBA2 ILIAS TOOLS AS SINGLE APPLICATIONS
ELBA2 ILIAS TOOLS AS SINGLE APPLICATIONS An AAA/Switch cooperative project run by LET, ETH Zurich, and ilub, University of Bern Martin Studer, ilub, University of Bern Julia Kehl, LET, ETH Zurich 1 Contents
MehrAdministering Microsoft Exchange Server 2016 MOC 20345-1
Administering Microsoft Exchange Server 2016 MOC 20345-1 In diesem 5-tägigen Kurs lernen Sie, wie Sie Exchange Server 2012 administrieren und supporten. Sie erfahren, wie Sie den Exchange Server 2016 installieren
MehrExercise (Part XI) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1
Exercise (Part XI) Notes: The exercise is based on Microsoft Dynamics CRM Online. For all screenshots: Copyright Microsoft Corporation. The sign ## is you personal number to be used in all exercises. All
MehrLevel 1 German, 2014
90886 908860 1SUPERVISOR S Level 1 German, 2014 90886 Demonstrate understanding of a variety of German texts on areas of most immediate relevance 9.30 am Wednesday 26 November 2014 Credits: Five Achievement
MehrChallenges for the future between extern and intern evaluation
Evaluation of schools in switzerland Challenges for the future between extern and intern evaluation Michael Frais Schulentwicklung in the Kanton Zürich between internal evaluation and external evaluation
MehrTurning Data Into Insights Into Value. Process Mining. Introduction to KPMG Process Mining
Turning Data Into Insights Into Value Process Mining Introduction to KPMG Process Mining Overview: KPMG Process Mining The Process Mining Technology Business Challenges Our Approaches TARGETED MEASURES
MehrGroup and Session Management for Collaborative Applications
Diss. ETH No. 12075 Group and Session Management for Collaborative Applications A dissertation submitted to the SWISS FEDERAL INSTITUTE OF TECHNOLOGY ZÜRICH for the degree of Doctor of Technical Seiences
MehrRESI A Natural Language Specification Improver
Universität Karlsruhe (TH) Forschungsuniversität gegründet 1825 RESI A Natural Language Specification Improver Dipl. Inform. Sven J. Körner Torben Brumm Prof. Dr. Walter F. Tichy Institute for Programming
MehrKonfiguration von eduroam. Configuring eduroam
eduroam Windows 8.1 / 10 Konfiguration von eduroam Configuring eduroam 08.10.2018 kim.uni-hohenheim.de kim@uni-hohenheim.de Wissenschaftliche Einrichtungen und Universitäten bieten einen weltweiten Internetzugang
MehrInequality Utilitarian and Capabilities Perspectives (and what they may imply for public health)
Inequality Utilitarian and Capabilities Perspectives (and what they may imply for public health) 1 Utilitarian Perspectives on Inequality 2 Inequalities matter most in terms of their impact onthelivesthatpeopleseektoliveandthethings,
MehrIT Risk Management. Digicomp Hacking Day, 11.06.2014 Umberto Annino
IT Risk Management Digicomp Hacking Day, 11.06.2014 Umberto Annino Wer spricht? Umberto Annino WirtschaCsinformaEker, InformaEon Security Was ist ein Risiko?! Sicherheit ist das Komplementärereignis zum
MehrScenario Building Workshop - Interplay of problem framings
Transdiciplinary Conference Inter- and Transdisciplinary Problem Framing, ETH Zürich, 27-28 November 2008 Scenario Building Workshop - Interplay of problem framings PD Dr. Rolf Meyer*, Dr. Martin Knapp*,
MehrLevel 2 German, 2016
91126 911260 2SUPERVISOR S Level 2 German, 2016 91126 Demonstrate understanding of a variety of written and / or visual German texts on familiar matters 2.00 p.m. Tuesday 29 November 2016 Credits: Five
MehrLehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str. 3 07743 Jena
Lehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str. 3 07743 Jena http://www.im.uni-jena.de Contents I. Learning Objectives II. III. IV. Recap
MehrAgenda Introduction The Founding Ideas Walter Eucken and the Ordnungpolitik Alfred Müller-Armack and the Ethical Dimension of the Social Market Econom
Sixty Years of Social Market Economy: Orientation in Post-War Times, after Reunification, and during the Current Economic Crisis Berthold U. Wigger Karlsruhe Institute of Technology (KIT) Chair of Public
MehrUsername and password privileges. Rechteverwaltung. Controlling User Access. Arten von Rechten Vergabe und Entzug von Rechten DBS1 2004
Arten von Rechten Vergabe und Entzug von Rechten Seite 1 Controlling User Access Database administrator Username and password privileges Users Seite 2 Privileges Database security System security Data
Mehr1. Fundamentals of Processes: Core Processes [ID: ] 2. Fundamentals of Processes: Core Processes [ID: ]
Detaillierte Testergebnisse für Testdurchlauf 1 1. Fundamentals of Processes: Core Processes [ID: 1430232] English: Which of the following statements usually refer to a critical (core) process of a company?
Mehr1. Fundamentals of Processes: Core Processes [ID: ] 2. Fundamentals of Processes: Core Processes [ID: ]
Detaillierte Testergebnisse für Testdurchlauf 1 1. Fundamentals of Processes: Core Processes [ID: 1430232] English: Which of the following statements usually refer to a critical (core) process of a company?
MehrMit Legacy-Systemen in die Zukunft. adviion. in die Zukunft. Dr. Roland Schätzle
Mit Legacy-Systemen in die Zukunft Dr. Roland Schätzle Der Weg zur Entscheidung 2 Situation Geschäftliche und softwaretechnische Qualität der aktuellen Lösung? Lohnen sich weitere Investitionen? Migration??
MehrLiLi. physik multimedial. Links to e-learning content for physics, a database of distributed sources
physik multimedial Lehr- und Lernmodule für das Studium der Physik als Nebenfach Links to e-learning content for physics, a database of distributed sources Julika Mimkes: mimkes@uni-oldenburg.de Overview
MehrEuropean Qualification Strategies in Information and Communications Technology (ICT)
European Qualification Strategies in Information and Communications Technology (ICT) Towards a European (reference) ICT Skills and Qualification Framework Results and Recommendations from the Leornardo-da-Vinci-II
MehrWie man heute die Liebe fürs Leben findet
Wie man heute die Liebe fürs Leben findet Sherrie Schneider Ellen Fein Click here if your download doesn"t start automatically Wie man heute die Liebe fürs Leben findet Sherrie Schneider Ellen Fein Wie
Mehr1. Fundamentals of Processes: Core Processes [ID: ] 2. Fundamentals of Processes: Core Processes [ID: ]
Detaillierte Testergebnisse für Testdurchlauf 1 1. Fundamentals of Processes: Core Processes [ID: 1430232] English: Which of the following statements usually refer to a critical (core) process of a company?
MehrSoll der Staat aktiv Innovationen fördern? Das Beispiel Airbus A400M
Wirtschaft Tobias Karcher Soll der Staat aktiv Innovationen fördern? Das Beispiel Airbus A400M Bachelorarbeit Bibliografische Information der Deutschen Nationalbibliothek: Die Deutsche Bibliothek verzeichnet
MehrDarstellung und Anwendung der Assessmentergebnisse
Process flow Remarks Role Documents, data, tool input, output Important: Involve as many PZU as possible PZO Start Use appropriate templates for the process documentation Define purpose and scope Define
MehrExercise (Part V) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1
Exercise (Part V) Notes: The exercise is based on Microsoft Dynamics CRM Online. For all screenshots: Copyright Microsoft Corporation. The sign ## is you personal number to be used in all exercises. All
MehrXML Template Transfer Transfer project templates easily between systems
Transfer project templates easily between systems A PLM Consulting Solution Public The consulting solution XML Template Transfer enables you to easily reuse existing project templates in different PPM
MehrExercise (Part VIII) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1
Exercise (Part VIII) Notes: The exercise is based on Microsoft Dynamics CRM Online. For all screenshots: Copyright Microsoft Corporation. The sign ## is you personal number to be used in all exercises.
MehrNew Forms of Risk Communication Workshop 6: Arzneimitteltherapiesicherheit (AMTS) Dr. Norbert Paeschke, BfArM
New Forms of Risk Communication Workshop 6: Arzneimitteltherapiesicherheit (AMTS) Dr. Norbert Paeschke, BfArM Bundesinstitut für Arzneimittel und Medizinprodukte Das BfArM ist ein Bundesinstitut im Geschäftsbereich
MehrISO 15504 Reference Model
Prozess Dimension von SPICE/ISO 15504 Process flow Remarks Role Documents, data, tools input, output Start Define purpose and scope Define process overview Define process details Define roles no Define
MehrOnline Learning in Management
43 rd EUCEN Conference 2012 Workshop: Supporting the individual learner in ULLL The Makes and Brakes of Collaborative E-Learning: Online Learning in Management - A case study - Dr. Marion Bruhn-Suhr University
MehrFunktion der Mindestreserve im Bezug auf die Schlüsselzinssätze der EZB (German Edition)
Funktion der Mindestreserve im Bezug auf die Schlüsselzinssätze der EZB (German Edition) Philipp Heckele Click here if your download doesn"t start automatically Download and Read Free Online Funktion
MehrINDUSTRIAL DATA SPACE DATA ECONOMY AND ANALYTICS CONCEPTS AND IMPLEMENTATION
INDUSTRIAL DATA SPACE DATA ECONOMY AND ANALYTICS CONCEPTS AND IMPLEMENTATION Big Data Summit, 28. Februar, Hanau Lars Nagel, Industrial Data Space Julia Oelgart, Head of Data Analytics, T-Systems, Deutsche
MehrLevel 2 German, 2013
91126 911260 2SUPERVISOR S Level 2 German, 2013 91126 Demonstrate understanding of a variety of written and / or visual German text(s) on familiar matters 9.30 am Monday 11 November 2013 Credits: Five
MehrProzesse als strategischer Treiber einer SOA - Ein Bericht aus der Praxis
E-Gov Fokus Geschäftsprozesse und SOA 31. August 2007 Prozesse als strategischer Treiber einer SOA - Ein Bericht aus der Praxis Der Vortrag zeigt anhand von Fallbeispielen auf, wie sich SOA durch die Kombination
MehrZurich Open Repository and Archive. Anatomie von Kommunikationsrollen. Methoden zur Identifizierung von Akteursrollen in gerichteten Netzwerken
University of Zurich Zurich Open Repository and Archive Winterthurerstr. 190 CH-8057 Zurich http://www.zora.uzh.ch Year: 2008 Anatomie von Kommunikationsrollen. Methoden zur Identifizierung von Akteursrollen
MehrSAP PPM Enhanced Field and Tab Control
SAP PPM Enhanced Field and Tab Control A PPM Consulting Solution Public Enhanced Field and Tab Control Enhanced Field and Tab Control gives you the opportunity to control your fields of items and decision
MehrSeminar: Software Engineering verteilter Systeme
Seminar: Software Engineering verteilter Systeme Hauptseminar im Sommersemester 2011 Programmierung verteilter Systeme Institut für Informatik Universität Augsburg 86135 Augsburg Tel.: +49 821 598-2118
MehrGeneral info on using shopping carts with Ogone
Inhaltsverzeichnisses 1. Disclaimer 2. What is a PSPID? 3. What is an API user? How is it different from other users? 4. What is an operation code? And should I choose "Authorisation" or "Sale"? 5. What
MehrSocial Sciences and Humanities role in Social Innovation Some key observations from the experience of TU Dortmund University sfs
Social Sciences and Humanities role in Social Innovation Some key observations from the experience of TU Dortmund University sfs Jürgen Howaldt & Dmitri Domanski Rethinking the role of Social Sciences
MehrJONATHAN JONA WISLER WHD.global
JONATHAN WISLER JONATHAN WISLER WHD.global CLOUD IS THE FUTURE By 2014, the personal cloud will replace the personal computer at the center of users' digital lives Gartner CLOUD TYPES SaaS IaaS PaaS
MehrFEM Isoparametric Concept
FEM Isoparametric Concept home/lehre/vl-mhs--e/cover_sheet.tex. p./26 Table of contents. Interpolation Functions for the Finite Elements 2. Finite Element Types 3. Geometry 4. Interpolation Approach Function
MehrPOST MARKET CLINICAL FOLLOW UP
POST MARKET CLINICAL FOLLOW UP (MEDDEV 2.12-2 May 2004) Dr. med. Christian Schübel 2007/47/EG Änderungen Klin. Bewertung Historie: CETF Report (2000) Qualität der klinischen Daten zu schlecht Zu wenige
MehrFACHKUNDE FüR KAUFLEUTE IM GESUNDHEITSWESEN FROM THIEME GEORG VERLAG
FACHKUNDE FüR KAUFLEUTE IM GESUNDHEITSWESEN FROM THIEME GEORG VERLAG DOWNLOAD EBOOK : FACHKUNDE FüR KAUFLEUTE IM GESUNDHEITSWESEN Click link bellow and free register to download ebook: FACHKUNDE FüR KAUFLEUTE
MehrFormalisierung von Akitivitätsstrukturen
Formalisierung von Akitivitätsstrukturen Stephan Trahasch Tobias Lauer 4. Februar 2004 Übersicht elearning Standards IMS Learning Design Workflow and Process Management ISO Collaborative Technology 04.02.2004
MehrDie einfachste Diät der Welt: Das Plus-Minus- Prinzip (GU Reihe Einzeltitel)
Die einfachste Diät der Welt: Das Plus-Minus- Prinzip (GU Reihe Einzeltitel) Stefan Frà drich Click here if your download doesn"t start automatically Die einfachste Diät der Welt: Das Plus-Minus-Prinzip
MehrSuisseID Digital passport and signature
Bilder einfügen: Post-Menü > Bild > Fotografie einfügen. Weitere Bilder unter www.brandingnet.ch Technische Angaben Bildgrösse vollflächig B 25,4 cm x H 19,05 cm entsprechen B 1500 Pixel x H 1125 Pixel
MehrWord-CRM-Upload-Button. User manual
Word-CRM-Upload-Button User manual Word-CRM-Upload for MS CRM 2011 Content 1. Preface... 3 2. Installation... 4 2.1. Requirements... 4 2.1.1. Clients... 4 2.2. Installation guidelines... 5 2.2.1. Client...
MehrLehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str. 3 07743 Jena
Lehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str. 3 07743 Jena http://www.im.uni-jena.de Contents I. Learning Objectives II. III. IV. Recap
MehrIATUL SIG-LOQUM Group
Purdue University Purdue e-pubs Proceedings of the IATUL Conferences 2011 IATUL Proceedings IATUL SIG-LOQUM Group Reiner Kallenborn IATUL SIG-LOQUM Group Reiner Kallenborn, "IATUL SIG-LOQUM Group." Proceedings
Mehr